A Limited Objective Experiment on Wireless Peer-To-Peer Collaborative Networking
|
|
|
- Griselda Preston
- 10 years ago
- Views:
Transcription
1 A Limited Objective Experiment on Wireless Peer-To-Peer Collaborative Networking Dr. Alex Bordetsky LCDR Glenn R. Cook Dr. Bill Kemple LCDR Timothy Thate Naval Postgraduate School Department of Information Sciences 589 Dyer Road, Room 200A Monterey, CA Abstract The implications of using peer-to-peer communications within an urban environment are significant for Military applications. From a networking perspective, the use of wireless technologies to support the collaboration may have impacts on bandwidth and spectrum utilization. This paper explores the effects of wireless peer-to-peer (P2P) network behavior on the performance of collaboration support applications. The results achieved during the limited objective experiment conducted by the Naval Postgraduate School demonstrate significant affects of roaming on application sharing performance and integration with client-server applications. We discuss the wireless network operation challenges leading to the solutions for scaling up application sharing and improving collaborators self-organizing behavior. 1. Introduction Communication within the collaborative network environment takes on many different modalities, including , chat, voice-over-ip and peer-to-peer (P2P). Each of these forms of collaborative communication has a different way of interacting with the network environment [1]. While most communications processes interact in a hierarchical fashion, peer-to-peer takes on a different methodology. Generally a P2P communication has the following characteristics: Direct connections between network clients Each client (node) is considered as an equal to all others Clients share processing, applications and content There is no central point of control within the network. Peer-to-peer computing is the sharing of computer resources and services by direct exchange between systems. In a peer-to-peer architecture, computers that have traditionally been used solely as clients communicate directly among themselves and can act as both clients and a server, assuming whatever role is most efficient for the network. This concept of computing isn t new (the idea is over thirty years old), but the emergence of inexpensive computing power, bandwidth, and storage has inspired reconsideration.
2 Report Documentation Page Form Approved OMB No Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE SEP REPORT TYPE 3. DATES COVERED to TITLE AND SUBTITLE A Limited Objective Experiment on Wireless Peer-To-Peer Collaborative Networking 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School,Department of Informaiton Sciences,589 Dyer Road, Room 200A,Monterey,CA, PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 11. SPONSOR/MONITOR S REPORT NUMBER(S) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified 18. NUMBER OF PAGES 9 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18
3 2. Experiment The Naval Postgraduate School (NPS) undertook an experiment to test the use of collaborative P2P communications in a wireless networked environment. This experiment was intended to provide initial data to evaluate the potential impact of using this technology in an urban warfare environment. The experiment was conducted on the NPS campus in March 2002 and involved a hostage search and rescue scenario within the confines of the NPS campus quad. The mission for the Reconnaissance and Surveillance Team (RST) on the ground was to build-up sufficient situational awareness by using P2P collaborative networking between RST members with Remote HQ, Local Command Post, and En route Scene-of-Action Commander. According to the scenario an unknown number of terrorists (represented by evil-looking RED Triangles) took hostages on an upper floor of Spanagel Hall, Naval Postgraduate School. Six student teams comprising the RST unit, armed only with their laptops, Pocket PCs, wireless internet, GROOVE P2P collaborative tools, and set of GPS interface agents, were asked to collaborate with an en route special team commander and HQ in Norfolk to establish situational awareness sufficient to plan and execute the rescue mission. Figure 1 illustrates the situational awareness view of the RST collaborative environment at the moment when bomb (black circle) is been identified in the Root Hall and several terrorists were spotted in Bullard and Spanagel Hall buildings. By means of collaborative tools this view was shared by the HQ with the individual teams in order to enable their awareness of the other teams positions and their views of the targets. Performance of those applications was expected to be rather sensitive to the state of the wireless network and Network Operations Center was established to assist the RST teams in managing their application resources. 2.1 P2P Wireless Collaborative Network Configuration A wireless network consisting of Cisco and Apple access points (Base Stations) were connected to the NPS LAN and were segmented from the main LAN by placing all the base stations on a separate subnet. Personal Data Assistants (PDA) and Laptop computers with wireless access cards were configured to connect to LAN through these access points. The experiment sponsor in Norfolk, VA had connectivity to this network through a secure pipe via the Internet. A network operations center (NOC) was established with a primary function of: Set up the experimental P2P wireless collaborative network Manage the network during the experiment Provide situational awareness to the local Command Center and sponsor headquarters Assist the operational team members Maintain communications during the experiment Collect the experimental data. The research role of NOC was to explore the feasibility of bandwidth management for P2P clients, scalability and mobility of collaborative network, integration of P2P with client-server communications, and feasibility of P2P collaborative network self-organizing behavior.
4 Figure 1: The RST situational awareness view The P2P wireless collaborative network was comprised of the following building blocks: Six mobile terminals each comprised of the Pocket PC (ipaq) with GPS receiver and wireless laptop mobile connected to local area wireless network 15 access points distributed over the university campus area to provide local area coverage and routing functionality Four network monitoring workstations Two Situational Awareness web servers; one at local NOC the other at Sponsors facility in Norfolk, VA. The first step was to create and capture topology. OPNET, a commercial network management software tool, allows topologies to be created manually or automatically[2]. Prior to the actual experiment, the managers created the topology manually because many of the devices were not configured with appropriate MIBs (Management Information Bases). A software simulation tool was used to predict expected network performances. This simulation enables decision makers to predict the efficiency and capacity of a proposed network before equipment is actually acquired. The simulation results also provided detailed information on network traffic and differentiated the traffic attributable to the wireless segment of the network. Performance statistics in terms of Wireless LAN Load, Throughput, Data Dropped, LAN Delay, Media Access Delay, HTTP Traffic Sent, HTTP Traffic Received, HTTP Page Response Time, and HTTP Object Response Time were available. This data became crucial when allocating
5 actual resources and then it was used to anticipate limitations that would impact operational success. Based on simulation performance analysis, the results warranted asset reallocation. Several components, including a second dedicated server, were added to the network. The analysis for the experiment determined that HTTP traffic would transmit through the P2P network without any serious delays. It also showed the network could handle an increased load without affecting service. OPNET s Application Characterization Environment (ACE) Application was used to capture packet data necessary to analyze application specific loads. Files and associated packet traffic was traced and documented to create an accurate model of network data exchange. This data was used to populate both the application layer and network layer views in the network model. Follow-on analysis was conducted using the functionality of ACE and an additional module called AppDoctor. AppDoctor provided analysis of the application task and reported on aspects of both network s and application s performance. ACE was also used to analyze the use of IP addresses. Each node in the network was identified by its team name and an IP address. Dynamic IP addressing was used during the experiment, so some IP addresses were not easily or automatically associated with known network nodes. Dynamic IP addressing did allow the network to reassign an IP address the microsecond it was relinquished Spectrum Network Management Software enabled the NOC to drill down into the network and provide detailed views of the network at user-defined levels [3]. Alarms or customized notifications could be established and system status changes indicated by a change in associated component icon color (from red to yellow depending on the parameter). Various views of the network included: Cablewalk view: The layouts of the access points that are connected to the LAN. Detailed information about each access point can be viewed by double clicking the associated icon. Device Topology. This detailed view details each network component (Figure 2). A normal connection is represented by a green color. An icon will turn red if performance has fallen beneath a set parameter. Link State View. Each component will display a green, yellow or red color depicting the health of the link. Simple Network Management Protocol(SNMP) is the Internet standard protocol, defined in STD 15, RFC 1157, developed to manage nodes on an IP network. It is used extensively by Spectrum to discover, model and monitor the network [4]. Active TCP connections can be monitored for any SNMP compliant asset on the network. The experiment was dynamic and exercised the spectrum of functionality of both a traditional and wireless hybrid network from a network management perspective. Spectrum network management software facilitated effective event tracking and system monitoring. The tools were versatile and allowed participants to see how their activities impacted the health of the network. There were sufficient user-defined parameters and alarms that allowed the NOC to shift assets to avoid impeding packet traffic during the scenario.
6 Figure 2: Network Topology 2.2 Network Monitoring Solarwinds Network Management System (Engineering Edition, evaluation version) was the commercially available software used during the LOE to monitor elements of network performance and faults. There were several factors specifically chosen to monitor during the P2P experiment including:. Network Performance Current Response Time and Percent Packet Loss Average Response Time and Percent Packet Loss. Solarwinds Network Management software was also used for fault management. Network performance and fault management could be monitored simultaneously. The following elements of fault management were evaluated: Monitored events and traps originating from the wireless network elements. Configured alarm severity levels along with filters based on time, source, severity, and type. User-defined action scripts registered for certain alarm types or network element instances. Actions could initiate NOC Manager notification through or pages (beeper). Color-coded hierarchy display for alarm level indications. Number and time distribution of selected alarms, alarm severity, alarm state, or network elements effected.
7 2.3 Bandwidth Monitoring The bandwidth monitor feature of Solarwinds provided a variety of display options. The primary limitation of this function was that each terminal be SNMP compliant. In the experiment, none of the hand-held terminals and only four of the six laptop terminals had functional MIBs. Bandwidth capability had to be monitored on the servers. SolarWinds TraceRoute module was useful in evaluating bandwidth usage. The utility will not only the path network traffic takes from each node on the network, it also displays selected SNMP information about each device encountered. Response time and packet loss information could be displayed both as a number and as a bar graph. TraceRoute could also be used to evaluate or query SNMP compliant machines outside the network. Other filters were initially created to capture packets from ports utilized by Net meeting and Groove but were found to unsuccessful during dry run tests. Additionally, a No filter capture agent was created to capture all data flowing between the server and team devices but was lost due to parsing errors associated with initial header size configuration settings. As a result, this analysis focused primarily on TCP and HTTP Port 80 activity captured at the server. Capturing packets was initiated at the beginning of the LOE. System errors that occurred during the experiment required re-initialization of the capture process. The result was that only the last segment of the LOE was recorded and compiled for analysis. The trace file was then imported into ACE and configured via the import wizard for proper network reference alignment. What became evident in this analysis is that network degradation could often be correlated to specific application use. Microsoft Net meeting, MAPIX and GPS data transmissions to the LOE Server degraded the network to some degree, but in most cases, degradation was consistent from team to team and from wireless access point to another. 3. Results and Discussion Factors affecting overall performance of the experiment network focused on the application layer. Performance metrics were not consistent across all devices, but this could be attributed to location of the individual teams relative to the wireless access points or individual laptop application configurations with regards to processes running in the background on each node. The primary recommendation to improve application packet transfer would be coordinated turnkey configurations on each node of the network. Specifically, adjust the system configurations so there are minimal applications running in the background on the nodes. Bandwidth was not an issue during this experiment. Bandwidth utilization for each of the terminals averaged around one percent of capacity and peaked at two percent. Figure 3, Bandwidth Received and Transmitted shows that the average bandwidth received was around 100 Kbps, and transmissions averaged around 10 Kbps.
8 While this experiment was not bandwidth intensive, the percent packet loss averaged around 35.2 indicating that the network was not configured for applications that required dedicated bandwidth. (Figure 4) All Teams Bandwidth Received Bandwidth Received in Kbps Time Team 1 Received Team 2 Received Team 3 Received Team 4 Received Team 5 Received All Teams Bandwidth Transmissions Bandwidth Transmitted in Kbps Time Team 1 Transmitted Team 2 Transmitted Team 3 Transmitted Team 4 Transmitted Team 5 Transmitted Figure 3: Bandwidth Received and Transmitted Percent Packet Loss Percent Packet Loss Time Team 1 Team 2 Team 3 Team 4 Team 5 Team 6 IPAQ 1 IPAQ 2 IPAQ 3 IPAQ 4 IPAQ 5 IPAQ 6 Figure 4: Percent Packet Loss
9 A mobile node should be able to monitor its own signal strength and bandwidth utilization. This was a critical form of operational feedback provided to the teams from the NOC. The result was the teams adjusted their physical location or changed applications being used on their devices. The experiment demonstrated the scalability of a wireless P2P collaborative networking, yet emphasized the network overhead needed to synchronizing voice over IP communication. Voice packets were sequentially routed with other application packets, but the result was seemingly broken communication. Other traditional voice communication modes were more reliable. The data sharing features scaled-up effectively. The experiment demonstrated that P2P and Client-Server integration is feasible, but sensitive to roaming between the access point coverage areas. Application sharing was especially sensitive to roaming as applications would drop when a team crossed a boundary of access point coverage. There was substantial packet loss until the application was restarted in the new area, so error checking and system synchronization/restoration features are necessary Self-organizing behavior was demonstrated when Reconnaissance and Survey team members switched modes of communication due to signal loss or interference. Yet, the strongest (and unexpected) effect of self-organizing behavior emerged at the command and control center site when network center managers were able to effectively monitor performance and fault data, synchronize this data with the voice and data sharing calls, and adjust assets or operations before packets and connectivity between peers was lost. Essentially, new channels of communication between team members were facilitated in real time by the NOC monitoring team elements. 4. Conclusions and Future Research This experiment demonstrated how network management tools can be used to view a complex organization and monitor the flow of information. Network response time was, for the most part, consistently around fifty milliseconds for all terminals. The greatest indicator of network flow was the analysis of the percent packet loss. Every team was all over the board in regards to packet loss. Each team dropped approximately 35.2 percent, yet even with re-transmission of the affected data packets, the twelve wireless units still consumed less than one percent of the bandwidth available. Wireless P2P collaborative networks are feasible, but the application programs used for communications are not yet robust enough to support mission critical environments. Future research should focus on the stability of the application layer and the capabilities from the communications programs to automatically re-establish communications if dropped from a mobile network. While bandwidth was not an issue in this small experiment, it is important to remember that much of the utilization of the bandwidth that was used came from the re-transmission of data packets lost through application drop-off.
10 5. References [Bordetsky, 2000] Alex Bordetsky. Adaptive QoS Management via Multiple Collaborative Agents. Ch.4 in: Agent Technology for Communications Infrastructure Wiley Press, 2000 [Lewis, 2000] Lundy Lewis. Service Level Management for Enterprise Networks, Artech House, 2000 [Perkins and McGinnis, 1997] David Perkins and Evan McGinnis, Understanding SNMP MIBs, Prentice Hall, 1997 [Opnet.com, 2002] Software that Understands Networks,
Report Documentation Page
(c)2002 American Institute Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE
CAPTURE-THE-FLAG: LEARNING COMPUTER SECURITY UNDER FIRE LCDR Chris Eagle, and John L. Clark Naval Postgraduate School Abstract: Key words: In this paper, we describe the Capture-the-Flag (CTF) activity
Overview Presented by: Boyd L. Summers
Overview Presented by: Boyd L. Summers Systems & Software Technology Conference SSTC May 19 th, 2011 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
Asset Management- Acquisitions
Indefinite Delivery, Indefinite Quantity (IDIQ) contracts used for these services: al, Activity & Master Plans; Land Use Analysis; Anti- Terrorism, Circulation & Space Management Studies; Encroachment
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Issue Paper. Wargaming Homeland Security and Army Reserve Component Issues. By Professor Michael Pasquarett
Issue Paper Center for Strategic Leadership, U.S. Army War College May 2003 Volume 04-03 Wargaming Homeland Security and Army Reserve Component Issues By Professor Michael Pasquarett Background The President
RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and
RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for
Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite
Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite EXECUTIVE SUMMARY CISCOLIVE Europe 2010 Annual Cisco IT and communications conference Event held at Barcelona,
FIRST IMPRESSION EXPERIMENT REPORT (FIER)
THE MNE7 OBJECTIVE 3.4 CYBER SITUATIONAL AWARENESS LOE FIRST IMPRESSION EXPERIMENT REPORT (FIER) 1. Introduction The Finnish Defence Forces Concept Development & Experimentation Centre (FDF CD&E Centre)
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
SNMP Monitoring: One Critical Component to Network Management
Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management
Using the Advancement Degree of Difficulty (AD 2 ) as an input to Risk Management James W. Bilbro JB Consulting International Huntsville, AL Multi-dimensional Assessment of Technology Maturity Technology
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
ENSC 427: COMMUNICATION NETWORKS Simulation and Analysis of Wi-Fi Performance in campus network
ENSC 427: COMMUNICATION NETWORKS Simulation and Analysis of Wi-Fi Performance in campus network Group No. 1 Chang, Zheng (Matt) [email protected] Tao, Yigang (Yi Gang) [email protected] Wen, Haoxian (Colman) [email protected]
NETFORT LANGUARDIAN MONITORING WAN CONNECTIONS. How to monitor WAN connections with NetFort LANGuardian Aisling Brennan
NETFORT LANGUARDIAN MONITORING WAN CONNECTIONS How to monitor WAN connections with NetFort LANGuardian Aisling Brennan LANGuardian gives you the information you need to troubleshoot problems and monitor
Chapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Network Troubleshooting with the LinkView Classic Network Analyzer
November 2, 1999 www.wwgsolutions.com Network Troubleshooting with the LinkView Classic Network Analyzer Network Troubleshooting Today The goal of successful network troubleshooting is to eliminate network
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation
73rd MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation 21-23 June 2005, at US Military Academy, West Point, NY 712CD For office use only 41205 Please complete this form 712CD as your cover
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS
THE FLATWORLD SIMULATION CONTROL ARCHITECTURE (FSCA): A FRAMEWORK FOR SCALABLE IMMERSIVE VISUALIZATION SYSTEMS Anton Treskunov, Jarrell Pair*, and Bill Swartout Institute for Creative Technologies University
DCAA and the Small Business Innovative Research (SBIR) Program
Defense Contract Audit Agency (DCAA) DCAA and the Small Business Innovative Research (SBIR) Program Judice Smith and Chang Ford DCAA/Financial Liaison Advisors NAVAIR 2010 Small Business Aviation Technology
SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN
SUNYIT Reaction Paper 2 Measuring the performance of VoIP over Wireless LAN SUBMITTED BY : SANJEEVAKUMAR 10/3/2013 Summary of the Paper The paper s main goal is to compare performance of VoIP in both LAN
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
CHAPTER. Monitoring and Diagnosing
CHAPTER 20. This chapter provides details about using the Diagnostics & Monitoring system available through ShoreTel Director. It contains the following information: Overview... 661 Architecture... 661
A GPS Digital Phased Array Antenna and Receiver
A GPS Digital Phased Array Antenna and Receiver Dr. Alison Brown, Randy Silva; NAVSYS Corporation ABSTRACT NAVSYS High Gain Advanced GPS Receiver (HAGR) uses a digital beam-steering antenna array to enable
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
DEFENSE CONTRACT AUDIT AGENCY
DEFENSE CONTRACT AUDIT AGENCY Fundamental Building Blocks for an Acceptable Accounting System Presented by Sue Reynaga DCAA Branch Manager San Diego Branch Office August 24, 2011 Report Documentation Page
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
Advanced Micro Ring Resonator Filter Technology
Advanced Micro Ring Resonator Filter Technology G. Lenz and C. K. Madsen Lucent Technologies, Bell Labs Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection
Multiple Network Marketing coordination Model
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
In June 1998 the Joint Military Intelligence. Intelligence Education for Joint Warfighting A. DENIS CLIFT
Defense Intelligence Analysis Center, home of JMIC. Intelligence Education for Joint Warfighting Courtesy Joint Military Intelligence College By A. DENIS CLIFT In June 1998 the Joint Military Intelligence
How To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, [email protected] Abstract The growing
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
EAD Expected Annual Flood Damage Computation
US Army Corps of Engineers Hydrologic Engineering Center Generalized Computer Program EAD Expected Annual Flood Damage Computation User's Manual March 1989 Original: June 1977 Revised: August 1979, February
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
Consolidating HFC Device and Network Management and Monitoring under SCTE HMS SNMP
Consolidating HFC Device and Network Management and Monitoring under SCTE HMS SNMP NuDesign OEM Product Family The SCTE HMS subcommitte has devised an extensive set of standards for outside and inside
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
Network setup and troubleshooting
ACTi Knowledge Base Category: Troubleshooting Note Sub-category: Network Model: All Firmware: All Software: NVR Author: Jane.Chen Published: 2009/12/21 Reviewed: 2010/10/11 Network setup and troubleshooting
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
The Advantages of Using EIGRP on an Enterprise Network
The Advantages of Using EIGRP on an Enterprise Network By Randy Patrick Submitted to the Faculty of the Information Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor
An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation
NASA/TM 2005-213568 An Oil-Free Thrust Foil Bearing Facility Design, Calibration, and Operation Steve Bauman Glenn Research Center, Cleveland, Ohio March 2005 The NASA STI Program Office... in Profile
How To Manage A Network Management System (Hitachi)
Hitachi Review Vol. 51 (2002), No. 2 65 Integrated Management System Job Management Partner 1 (JP1), Version6i for Broadband Networks Yoshiyuki Kurosaki Toshio Sato Kiminori Sugauchi Tokuji Tamada OVERVIEW:
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
OAM Operations Administration and Maintenance
OAM Operations Administration and Maintenance IERU Communications Ltd OAM Rev. A Page 1 of 9 Operations Administration and Maintenance 1. Overview This paper describes the Ethernet and Multi-Protocol Label
VoIP QoS on low speed links
Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia [email protected] QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical
A Summary of Network Traffic Monitoring and Analysis Techniques
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_monitoring/index.html 1 of 9 A Summary of Network Traffic Monitoring and Analysis Techniques Alisha Cecil, [email protected] Abstract As company intranets
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
Cisco Network Analysis Module Software 4.0
Cisco Network Analysis Module Software 4.0 Overview Presentation Improve Operational Efficiency with Increased Network and Application Visibility 1 Enhancing Operational Manageability Optimize Application
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
Top-Down Network Design
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
OPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
QAME Support for Policy-Based Management of Country-wide Networks
QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal
ehealth and VoIP Overview
ehealth and VoIP Overview Voice over IP (VoIP) configurations can be very complex. Your network could contain a variety of devices, applications, and configuration capabilities to support voice traffic.
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP
THE MIMOSA OPEN SOLUTION COLLABORATIVE ENGINEERING AND IT ENVIRONMENTS WORKSHOP By Dr. Carl M. Powe, Jr. 2-3 March 2005 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Configure A VoIP Network
Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: [email protected] Ms. Zarna M. Gohil Electronics & Communication
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
Carrier Ethernet: New Game Plan for Media Converters
Introduction IEEE Std. 802.3ah, also referred to as Ethernet in the First Mile (EFM) standard, has a well established name within the industry today. It lays out ground rules for implementing Ethernet
Nimsoft for Network Monitoring. A Nimsoft Service Level Management Solution White Paper
Nimsoft for Network Monitoring A Nimsoft Service Level Management Solution White Paper Nimsoft for Network Monitoring Table of Contents Nimsoft for Network Monitoring Solution Summary... 3 Solution Overview...
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center
Pima Community College Planning Grant For Autonomous Intelligent Network of Systems (AINS) Science, Mathematics & Engineering Education Center Technical Report - Final Award Number N00014-03-1-0844 Mod.
CISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP
Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU
Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks
ENSC 427: Communication Network Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks Simon Fraser University - Spring 2012 Claire Liu Alan Fang Linda Zhao Team 3 csl12 at sfu.ca
Operation Tools. S&C IntelliTeam CNMS Communication Network Management System. Table of Contents. Overview... 2 Tools. Section Page Section Page
S&C IntelliTeam CNMS Communication Network Management System Operation Tools Table of Contents Section Page Section Page Overview.... 2 Tools Database Administration.... 4 User Triggered Database-Backup....
Building a Highly Available and Scalable Web Farm
Page 1 of 10 MSDN Home > MSDN Library > Deployment Rate this page: 10 users 4.9 out of 5 Building a Highly Available and Scalable Web Farm Duwamish Online Paul Johns and Aaron Ching Microsoft Developer
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
ProSafe Plus Switch Utility
ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No
MIDAS. Event Log Viewer User s Guide. Part Number MN/MID-EVLOG.IOM Revision 0
MIDAS Event Log Viewer User s Guide Part Number MN/MID-EVLOG.IOM Revision 0 Table Of Contents: OVERVIEW... 3 STARTING THE EVENT LOG VIEWER... 4 HOW THE VIEWER IS ORGANIZED... 7 DATA VIEW SELECTOR... 7
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Computer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
Truffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
Exhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
PVNMS Brochure. 2013 All rights reserved. Proxim Wireless Corporation. 1
2013 All rights reserved. Proxim Wireless Corporation. 1 Manage Your Wireless Network Via The Cloud Engineered with a revolutionary new design, the next generation ProximVision Network Management System
Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
D-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND. Ready. Resourceful. Responsive!
~ IISUP-. NAVAL SUPPLY SVSTE:MS COMMAND Ready. Resourceful. Responsive! Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated
Site Survey and RF Design Validation
CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and
Smart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
